Episode 41 – GrapheneOS Setup, 2025 Goals, KOSA, & More

A hooligan is a person who behaves in a rowdy, violent, or unlawful way, often in a group or gang. Hooligans are often associated with crowds at sporting events, but anyone who acts in a disruptive or obnoxious way could be considered a hooligan.

WHATS UP PRIVACY HOOLIGANS !!!!!

ShowNotes – https://forum.closednetwork.io/t/episode-41-grapheneos-setup-2025-goals-kosa-more/135

Website / Donations / Support – https://closednetwork.io/support/

BTC Lightning Donations – [email protected]

Thank You Patreons! –
https://www.patreon.com/closednetwork

Michael Bates – Privacy Bad Ass
Richard G. – Privacy Bad Ass
Daniel J Martin – Privacy Bad Ass
Dnew – Privacy Bad Ass

Timothy Kelley – Privacy Advocate

Hutch – Privacy Advocate

TOP LIGHTNING BOOSTERS !!!! THANK YOU !!!

@bon – 3,456 SATS
@wartime 666 SATS
@thebird 500 SATS

Thank You To Our Moderators:
Unintelligentseven – Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354d
MaddestMax – Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavt

Closed Network Forum – https://forum.closednetwork.io

Join Our Matrix Channels!
Main – https://matrix.to/#/#closedntwrk:matrix.org
Off Topic – https://matrix.to/#/#closednetworkofftopic:matrix.org

Join Our Mastodon server!
https://closednetwork.social

Follow Simon On The Socials

Mastodon – https://closednetwork.social/@simon
NOSTR – Public Address – npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 – primal.net/simon
Twitter / X – @ClosedNtwrk
Email – [email protected]

  • My 2025 GrapheneOS setup
  • 2025 Changes I’m working on
  • XMR Accumulation Strategy?
    • Use XMR Bazzar – https://xmrbazaar.com/
      • Contract work in XMR payments

What do I use XMRm for?

  • Domain Name Registrations
  • Esim – Silent Link
  • VPN – Mullvad
  • Anon Shop purchases

Travel Rule: As Surveillance Increases, EU Not Off To A Great 2025
The EU is ringing in 2025 with a truly remarkable shitshow for your financial privacy and security.
https://www.therage.co/travel-rule-crypto-surveillance/


Siri “unintentionally” recorded private convos; Apple agrees to pay $95M
https://arstechnica.com/tech-policy/2025/01/apple-agrees-to-pay-95m-delete-private-conversations-siri-recorded/

AT&T and Verizon say networks secure after Salt Typhoon breach
https://www.bleepingcomputer.com/news/security/atandt-and-verizon-say-networks-secure-after-salt-typhoon-breach/


Safing and iVPN join forces. Safing is acquired by iVPN.

Viktor (iVPN) and Raphael (Safing) discuss the merge and what they claim the benefits will be to end users.

Video – https://www.youtube.com/watch?v=O2Maf2u4Z90

Blog Post – https://safing.io/blog/2024/12/03/a-new-chapter-begins/

Portmaster and SPN will remain open source.
IVPN is committed to maintaining and improving the software and services you rely on.
IVPN has no plans to change the business model, pricing, or policies in ways that would present a disadvantage.


Tornado Cash: Storm Files For Reconsideration Of Motion To Dismiss

https://www.therage.co/tornado-cash-storm-van-loon

Discord’s New Age Verification uses AI and Your Face!


KOSA UPDATES:

Main Objectives

Protect children online by implementing safety measures for platforms used by minors.
Regulate design features and content recommendations to prevent harm to children.
Introduce transparency and parental tools for monitoring children’s online activities.
Key Provisions

  1. Duty of Care

Platforms must mitigate harms such as mental health disorders, compulsive use, cyberbullying, and exploitation of minors.
Restrictions on promoting harmful products (e.g., tobacco, alcohol).

  1. Safeguards for Minors

Platforms must provide:

Tools for parents to monitor usage.
Options for limiting engagement-driven features (e.g., autoplay, infinite scrolling).
Default protective settings for minor accounts.
Reporting mechanisms for harms.

  1. Transparency and Reporting

Platforms must:

Disclose risks and safety measures annually.
Provide detailed reports on the time minors spend on platforms and exposure to harmful content.

  1. Research and Guidance

Studies on the impact of online platforms on minors, focusing on mental health and addictive behaviors.
Development of age-verification methods.

  1. Filter Bubble Transparency

Platforms must:

Inform users about algorithmic content recommendations.
Allow users to opt for “input-transparent algorithms” without personalized recommendations.

  1. Enforcement

Federal Trade Commission (FTC) and state attorneys general can enforce compliance.
Violations treated as deceptive or unfair practices.

  1. Age Verification

Study and implement feasible methods for verifying age at the device or system level.
Criticisms & Privacy Concerns

Mandatory Age Verification:

Requires platforms to verify users’ ages, likely leading to increased collection of personal data.
Creates risks of data breaches and misuse of sensitive information.
Increased Data Collection:

Platforms may need to collect and store more personal data to comply, contrary to privacy principles of minimizing data collection.
Broad Enforcement Scope:

Vague definitions of “harm” and “reasonable care” could lead to over-enforcement and platform liability for user-generated content.
Surveillance Risks:

Parental tools and reporting mechanisms may inadvertently promote surveillance of minors’ activities.
Content Filtering and Free Speech:

Platforms may over-censor content to avoid liability, impacting free speech for both minors and adults.
Barriers for Small Platforms:

Compliance costs for transparency reports and safeguards may disproportionately impact smaller platforms, reducing competition.
Why KOSA May Be Bad for Online Privacy

Massive Overreach in Data Requirements: Platforms are compelled to implement systems for monitoring and managing minors’ activities, requiring data on user behavior, preferences, and age.
Chilling Effect on Expression: The bill incentivizes platforms to aggressively moderate content, potentially suppressing lawful and valuable discussions.
Weakens Anonymity: Mandating age verification undermines anonymity—a cornerstone of online privacy and safety for vulnerable groups.
Vulnerability to Exploitation: A centralized system for verifying and monitoring age could be exploited by malicious actors or government overreach.

Section 108 o the KOSA Bill. – https://www.congress.gov/bill/118th-congress/house-bill/7891/text

SEC. 108. Age verification study and report.

(a) Study.—The Secretary of Commerce, in coordination with the Federal Communications Commission and Federal Trade Commission, shall conduct a study evaluating the most technologically feasible methods and options for developing systems to verify age at the device or operating system level.

(b) Contents.—Such study shall consider—

(1) the benefits of creating a device or operating system level age verification system;

(2) what information may need to be collected to create this type of age verification system;

(3) the accuracy of such systems and their impact or steps to improve accessibility, including for individuals with disabilities;

(4) how such a system or systems could verify age while mitigating risks to user privacy and data security and safeguarding minors’ personal data, emphasizing minimizing the amount of data collected and processed by covered platforms and age verification providers for such a system;

(5) the technical feasibility, including the need for potential hardware and software changes, including for devices currently in commerce and owned by consumers; and

(6) the impact of different age verification systems on competition, particularly the risk of different age verification systems creating barriers to entry for small companies.

(c) Report.—Not later than 1 year after the date of enactment of this Act, the agencies described in subsection (a) shall submit a report containing the results of the study conducted under such subsection to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Energy and Commerce of the House of Representatives.

SEC. 112. Effective date.

Except as otherwise provided in this title, this title shall take effect on the date that is 18 months after the date of enactment of this Act.

SEC. 113. Rules of construction and other matters.

(a) Relationship to other laws.—Nothing in this title shall be construed to—

(1) preempt section 444 of the General Education Provisions Act (20 U.S.C. 1232g, commonly known as the “Family Educational Rights and Privacy Act of 1974”) or other Federal or State laws governing student privacy;

(2) preempt the Children’s Online Privacy Protection Act of 1998 (15 U.S.C. 6501 et seq.) or any rule or regulation promulgated under such Act; or

(3) authorize any action that would conflict with section 18(h) of the Federal Trade Commission Act (15 U.S.C. 57a(h)).

(b) Protections for privacy.—Nothing in this title shall be construed to require—

(1) the affirmative collection of any personal data with respect to the age of users that a covered platform is not already collecting in the normal course of business; or

(2) a covered platform to implement an age gating or age verification functionality.

Great video by SomeOrdinaryGamers



NOSTR – Public Address – npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 – primal.net/simon
Twitter / X – @ClosedNtwrk
Email – [email protected]

Leave a Reply

Your email address will not be published. Required fields are marked *